Google Home brings free mobile and landline calls to UK users
If you live in the UK and have been looking for another reason to invest in a Google Home smart speaker, Google just gave you one. The company is going to give UK users the ability to place free calls to mobile and landline numbers.
An update rolling out this week will add the new feature to Google Home speakers around the country. The feature was announced last year, and it brings the UK in line with the US -- and, importantly, it does not require tethering to a mobile phone, thereby trumping Apple HomePod.
Perception of cloud security challenges differs across industries
The cloud brings many benefits to businesses, but it also brings with it risks, the biggest of which concerns the security of information.
A new survey from cloud governance specialist Netwrix looks at how different sectors and geographies deal with cloud security.
Chrome for Windows drops Microsoft compiler in favor of Clang
The Windows version of Google Chrome is ditching Microsoft's C++ Compiler and switching to Clang. The change brings Chrome for Windows in line with versions of the browser for macOS, Android and Linux.
The move not only makes complete sense for Google -- why not use the same compiler on all platforms, after all? -- it makes Chrome the first high-profile Windows app to make use of the open source compiler Clang.
Microsoft confirms Windows 10 S will become a 'mode' of Windows 10 next year
It was reported last month that Microsoft was planning to transition its education-focused Windows 10 S from a separate operating system into a "mode" in existing versions of Windows 10.
It was a move that surprised no one. Windows 10 S is a locked down version of Windows 10 that can only run UWP apps from the Microsoft Store, and while that makes it more secure, it also significantly limits what can be done with the OS.
BlackBerry sues Facebook, WhatsApp and Instagram in messaging patent spat
BlackBerry -- yep, them -- has filed a lawsuit against Facebook, WhatsApp and Instagram, claiming that the companies infringed on patents relating to BlackBerry Messenger.
This is not the first time the company has sued other tech firms, drawing on its back catalog of over 40,000 patents in a bid to pull in money through licensing fees. BlackBerry insists, however, that litigation is "not central to [its] strategy."
As Debian comes to Windows 10, should we worry Microsoft will 'embrace, extend, and extinguish' Linux?
Personally, I am not a fan of running Linux distributions on Windows 10 -- WSL, virtual machine, or otherwise. While I appreciate Microsoft's focus on Linux lately, I am of the opinion that if you want to run an operating system based on that open source kernel, then you should just do so natively -- not on top of Windows. While there is no proof that anything nefarious is afoot, it does feel like maybe the Windows-maker is hijacking the Linux movement a bit by serving distros in its store. I pray there is no "embrace, extend, and extinguish" shenanigans going on.
Just yesterday, we reported that Kali Linux was in the Microsoft Store for Windows 10. That was big news, but it was not particularly significant in the grand scheme, as Kali is not very well known. Today, there is some undeniably huge news -- Debian is joining SUSE, Ubuntu, and Kali in the Microsoft Store. Should the Linux community be worried?
Microsoft releases Windows 10 Spring Update (RS4) Build 17115 for the Fast ring, with big privacy changes [Updated]
New builds for the next big feature update of Windows 10 are coming thick and fast. Build 17112 was released last Friday, and today Build 17115 makes its way on to the Fast ring.
Builds rolled out this close to official launch tend to just be about fixing bugs and adding polish, but 17115 actually makes a big change to the privacy screen settings layout.
Microsoft Surface Pro with LTE Advanced now available to consumers
Laptops and detachable tablets have come a long way in recent years, becoming smaller, lighter and more energy-efficient with each new generation. But, even though they're more portable, they're not necessarily easy to use on the road as well.
What I mean by that is that connectivity remains limited to Wi-Fi for the vast majority of devices that hit the market these days. If you don't have coverage, you have to set up a hotspot on your phone. And that's a shame. However, there are some notable exceptions, with the Surface Pro with LTE Advanced being one of the most interesting of the bunch.
Video shows the speed difference a new battery makes to an iPhone 6s
It's not all that long since it came to light that Apple was purposefully reducing the speed of older iPhones in order to compensate for aging batteries. In the wake of the backlash that followed, the company announced a cheap battery replacement program, and also plans to introduce an update to iOS that allowed users to opt out of this performance reduction.
But just how significant was the slowdown? One iPhone user has released a video showing the performance difference between an old iPhone 6s, and the same phone with a new battery. The results are noteworthy to say the least.
123 Reg backup cockup wipes out users' websites since August last year
Web host 123 Reg has suffered something of an issue causing it to replace some users' websites with backups dating back to August 2017. Other website owners complained that their sites had been taken offline completely.
For anyone who has not made their own backup of their website, it's not looking as though 123 Reg will be able to help. Changes made since August last year appear to have been lost forever. Unsurprisingly, customers are more than a little irked.
Ransomware gives way to miners as cyber criminals follow the money
Cyber criminals have started using sophisticated infection methods and techniques borrowed from targeted attacks in order to install mining software on attacked PCs within organizations says Kaspersky Lab.
Some 2.7 million users have been attacked by malicious miners in 2017, according to Kaspersky's data. That's around 50 percent higher than in 2016 (1.87 million). But at the same time ransomware attacks have seen a decline.
AlgoSec launches network security policy management as a service
Managing security policy can be a headache for organizations with lots of users. But now business-driven security policy management specialist AlgoSec is launching an as-a-service policy management solution.
AlgoSaaS allows enterprise organizations to quickly and easily get the benefits of cloud-based security service offerings. It needs minimal end-user maintenance and is scalable to cope with business growth.
Reliable SMS interception leaves 2FA accounts open to attack
Text messages via SMS are often used as part of two-factor authentication strategies to protect login accounts.
But a new and worrying study from Positive Technologies shows that real-world attempts to intercept SMS messages are 100 percent successful.
Scrambling for cyber talent? Try bolstering from within
Data breaches dominated headlines in 2017, with more than 1200 breaches affecting up to half of the US population. Almost every week brings a new unsettling headline.
The current threat environment accelerates pressure on already overworked and understaffed security teams to shore up their organization’s defenses. There simply aren’t enough well-trained workers to cover the need. The Center for Cyber Safety and Education’s 2017 Global Information Workforce Study forecasted a 1.8 million cyber worker shortage by 2022. Solving it is one of the most important challenges our economy will face over the next 20 years.
Tesla hack demonstrates need to prioritize data security
The words "data security" made news once again last month when researchers revealed that Tesla’s AWS cloud systems were compromised for the purpose of cryptojacking. Cryptojacking, which is defined as the secret use of a computing device to mine cryptocurrency, has risen in popularity over the past few months. This is primarily due to 1) the surge in cryptocurrency value and 2) the discovery of clever mechanisms hackers can use to mine coins while going unnoticed.
According to RedLock researchers, the hackers infiltrated Tesla’s Kubernetes console, which is an open-source platform used for managing containerized workloads and services. They were able to access the console because it was not password protected. Within the Kubernetes pod, were Tesla AWS environment credentials which contained an Amazon S3 bucket that had sensitive data such as telemetry, mapping and vehicle servicing data.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.